I have a situation where I need to be able to capture and
decode SSL traffic between a server and a user. After doing some searching
via google, I think I understand that I need to get the .der and .pem files and
run openssl to get the private key, plug that into wireshark in order to be
able to decode the ssl traffic. If I am wrong, please correct me.
In the situations where I wont have access or be able to get
the .der and .pem files, is there a way that I can decode SSL traffic when I am
the endpoint (client) of a ssl communication with a server ?
Ron
Ronald
Nutter
Network Engineer
HNTB Companies
715 Kirk Drive
Kansas City, Mo. 64105
816-527-2787